(Source: BangaloreWeekly) … collect and analyze IT security data, discover and prioritize vulnerabilities, recommend remediation actions and verify the implementation of such actions.